Abstract:

This paper investigates whether optimisation techniques can be used to
evolve artifacts of cryptographic significance which are apparently
secure, but which have hidden properties that may facilitate
cryptanalysis. We show how this might be done and how such sneaky use of
optimisation may be detected.